7.5
CVSSv2

CVE-2013-2210

Published: 20/08/2013 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the XML Signature Reference functionality in Apache Santuario XML Security for C++ (aka xml-security-c) prior to 1.7.2 allows context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via malformed XPointer expressions. NOTE: this is due to an incorrect fix for CVE-2013-2154.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache xml security for c\\+\\+ 1.6.0

apache xml security for c\\+\\+ 1.1.0

apache xml security for c\\+\\+ 1.6.1

apache xml security for c\\+\\+ 1.2.1

apache xml security for c\\+\\+ 1.5.1

apache xml security for c\\+\\+ 1.5.0

apache xml security for c\\+\\+ 0.2.0

apache xml security for c\\+\\+ 1.3.0

apache xml security for c\\+\\+ 1.7.0

apache xml security for c\\+\\+

apache xml security for c\\+\\+ 1.4.0

apache xml security for c\\+\\+ 1.3.1

apache xml security for c\\+\\+ 1.2.0

apache xml security for c\\+\\+ 0.1.0

Vendor Advisories

Debian Bug report logs - #714241 xml-security-c: CVE-2013-2210 Package: xml-security-c; Maintainer for xml-security-c is Debian Shib Team <pkg-shibboleth-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 27 Jun 2013 07:03:01 UTC Severity: grave Tags: patch, security Fix ...
Jon Erickson of iSIGHT Partners Labs discovered a heap overflow in xml-security-c, an implementation of the XML Digital Security specification The fix to address CVE-2013-2154 introduced the possibility of a heap overflow in the processing of malformed XPointer expressions in the XML Signature Reference processing code, possibly leading to arbitra ...